參考文獻
[1]A. Gray and M. Haahr, 2004, “Personalised, Collaborative Spam Filtering”, First Conference on Email and Anti-Spam (CEAS).
[2]B. Mobasher, H. Dai, T. Luo, Y. Sun and J. Zhu, 2000, “Integrating web usage and content mining for more effective personalization”, in Proceedings of the International Conference on E-Commerce and Web Technologies, pp. 165-76.
[3]Bryan Costales, Eric Allman, 2002, sendmail 3rd Edition, O'Reilly &Associates, Inc.
[4]Castro, J.L., Castro-Schez, J.J., Zurita, J.M., 1999, “Learning maximal structure rules in fuzzy logic for knowledge acquisition in expert systems.”, Fuzzy Sets and Systems 101, 345–353.
[5]Castro, J.L., Castro-Schez, J.J., Zurita, J.M., 2001, “Use of a fuzzy machine learningtechnique in the knowledge acquisition process.”,Fuzzy Sets and Systems 123 (3), 307–320.
[6]EE, Jose Jesus Castro-Schez, Juan Luis Castro, Jose Manuel Zurita,2004, “ Fuzzy repertory table: a method for acquiring knowledge about input variables to machine learning algorithm.” ,IEEE T. Fuzzy Systems 12(1): 123-139.
[7]Elisabeth Crawford, Judy Kay, and Eric McCreath,2001, “Automatic Induction of Rules for e-mail Classification”, In Proceedings of the Sixth Australiasian Document Computing Symposium, Coffs Harbour, Australia, December 7.
[8]Evans, J., 1988, “The knowledge elicitation problem: a psychological perspective.”Behavior and Information Technology 1 (2), 111–130.
[9]Gammack, J., Young, R.,1985, “Psychological techniques for eliciting expert knowledge.” ,In: Bramer, M. (Ed.), Research and Development in Expert Systems. Cambridge University Press, London,pp. 105–112.
[10]Graessar, A.C., Gordon, S.E., 1991. Questions answering and the organization of the world knowledge. In: Kesesen W., Ortony, A., Craik, F. (Eds.), Memories, Thoughts, and Emotions. Essays in Honor of George Mandler. Earlbaum, Hillsdale, NJ.
[11]G. Boone. ,1998, “Concept features in Re:Agent, an intelligent email agent.” In K. P. Sycara and. M. Wooldridge, editors, Proceedings of the 2nd International Conference on Autonomous Agents., pages 141–148, New York, May 9–13.
[12]H. Drucker, Donghui Wu and VN Vapnik,1999, “Support vector machines for spam categorization” ,Neural Networks, IEEE Transactions on, vol. 10, pp. 1048-1054,.
[13]Hooman Katirai.,1999, Filtering junk E-mail: A performance comparison between genetic. programming and naive bayes. Available from: http://citeseer.ist.psu.edu/. katirai99filtering.html.
[14]Ion Androutsopoulos, John Koutsias, Konstantinos V. Chandrinos and Constantine D. Spyropoulos,2000, “An Experimental Comparison of Naive Bayesian and Keyword-Based Anti-Spam Filtering with Personal E-mail Messages,” in Proc. of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2000), Jul.
[15]J.J. Rocchio, 1971, “Relevance feedback in information retrieval,” ,In: G. Salton (ed.), The Smart retrieval system:. experiments in automatic document processing, Prentice Hall, pp. 313-323.
[16]Jefferson Provost.,1999, “Naive-Bayes vs. Rule-Learning in Classification of Email.” ,Technical Report AI-TR-99-284, The University of Texes at Austin, Artificial Intelligence Lab.
[17]Jose Jesus Castro-Schez, Nicholas R. Jennings, Xudong Luo, Nigel R. ,2004, “Shadbolt: Acquiring domain knowledge for negotiating agents: a case of study.” Int. J. Hum.-Comput. Stud. 61(1): 3-31.
[18]Kelly, G.A., 1955. The Psychology of Personal Constructs. Norton, New York.
[19]McDonald, J., Dearholt, D., Paap, K., Schvanevedt, R., 1986. A formal interface design methodology based on user knowledge. CHI’86 Proceedings, pp. 285–290.
[20]Mehran Sahami, Susan Dumais, David Heckerman, and Eric Horvitz.,1998, “ A bayesian approach to filtering junk E-mail.” ,In Learning for Text Categorization:Papers from the 1998 Workshop, Madison, Wisconsin.
[21]Vel, A. Anderson, M. Corney, and G. Mohay, 2001, “Mining e-mail content for author. identification forensics.” ,ACM SIGMOD Record,. vol. 30, pp. 55-64.
[22]Richard B. Segal and Jeffrey O. Kephart.,1999, Mailcat: An Intelligent Assistant for Organizing E-Mail. In Proceedings of the third annual conference on Autonomous Agents, Seattle, Washington, United States.
[23]Robert J. Hall. ,1996, “Channels: Avoiding Unwanted Electronic Mail.” ,In Proceedings of the 1996 DIMACS Symposium on Network Threats, volume 38, Piscataway, NJ, December 4-6.
[24]Schreiber, G., Akkermans, H., Anjewierden, A., Hoog, R., Shadbolt, N., Van de Velde, W., Wielinga, B.,2000. Knowledge Engineering and Management: The CommonKADS Methodology. Massachusetts Institute of Technology Press, Cambridge, MA.
[25]Shadbolt, N., Burton, A.M.,1989. “The empirical study of knowledge elicitation techniques.”, SIGART Newsletter 108, 15–18.
[26]Spamhaus, 2004, The Spamhaus Project, http://www.spamhaus.org/.
[27]Spamhaus, “The Definiation of Spam”, http://www.spamhaus.org/definition.html, 2006.
[28]Shortliffe, E.H. and B.G. Buchanan, 1975, “A Model of Inexact Reasoning in Medicine” , Mathematical Bioscinences, Vol. 23, pp. 351-379
[29]UCEB,2004, SPAM blocking blackhole list, http://www.uceb.org/.
[30]W. W. Cohen.,1995, “Fast effective rule induction. In Proceedings of the Twelfth International.”, Conference on Machine Learning (ICML-95), pages 115–123, San Francisco, CA.
[31]William W. Cohen,1993, “Learning Rules that Classify. E-Mail”, Proc. AAAI-1996 Spring Symposium on. Machine Learning in Information Access, pp. 124-143,. March.
[32]William W. Cohen.,1995, “Fast Effective Rule In-. duction,” In Armand Prieditis and Stuart Russell, edi-. tors, Proceedings of the 12th International Conference. on Machine Learning, pages 115–123, Tahoe City, CA
[33]Y. Diao, H. Lu, and D. Wu, 2000, “A Comparative Study of Classification Based Personal E-mail Filtering,” In Proceeding 4th Pacific-Asia Conference Knowledge Discovery and Data Mining, pp.408-419, April.
[34]Zadeh, L.A.,1975a, “The calculus of fuzzy restrictions. In: Zadeh, L.A., et al. (Ed.), Fuzzy Sets and Applications to Cognitive and Decision Making Processes. Academic Press, New York, pp. 1–39.
[35]國家通訊傳播委員會,2005,濫發商業電子郵件管理條例草案, http://www.dgt.gov.tw/chinese/ncc/mail-requlation/ncc-mail-requlation.shtml
[36]CNET,2005,垃圾郵件關鍵報告, http://www.cnet.com/.
[37]周延達,2005,產品設計開發之顧客需求辨識系統,亞洲大學資訊科學與應用學系碩士班,碩士論文。[38]朱蕙君,2005,以時間變因為基礎之多專家知識擷取與整合系統,暨南國際大學資訊管理學系,碩士論文。[39]潘建忠,2001,企業知識擷取及整合系統之研究,暨南國際大學資訊管理學系,碩士論文。[40]林順傑,2006,動態知識擷取方法之研究,國立交通大學資訊科學與工程研究所,博士論文。[41]沈麗靚,2003,安寧護理人員靈性概念之建構研究,南華大學生死學研究所,碩士論文。[42]余佳穎,2005,以凱利方格技術探討大學教師對科學研究的看法,東海大學教育研究所,碩士論文。[43]陳可恭,2004,從系統典範探討板塊構造學說多重類比教學-「凱利方格法」(RGT)之系統性應用,國立臺灣師範大學科學教育研究所,博士論文。[44]楊巽斐,2004,合作式行動研究對國中自然與生活科技教師教學信念的影響之研究,國立彰化師範大學科學教育研究所,博士論文。[45]陳惠貞,2002,以凱利方格技術探之學生知識概念圖-以高職數學為例,元智大學資訊工程學系,碩士論文。[46]李嘉雄,2002,基於群體構念結構之群體合作學習系統,元智大學資訊工程學系碩士論文。[47]李瓊慧,2001,以凱利方格法探究國三學生電化學迷思概念,國立臺灣師範大學科學教育研究所,碩士論文。[48]楊惠婷,2000,藥物濫用青少年生涯發展歷程與生涯建構之研究,國立高雄師範大學輔導研究所,碩士論文。[49]陳雅芬,2000,以凱利方格法探討學生對於氣體的概念理解,國立臺灣師範大學科學教育研究所,碩士論文。[50]鄭斐娟,1999,探討國中生生物科自我效能與教師期望之關係,國立臺灣師範大學科學教育研究所,碩士論文。[51]劉威德,1998,教師教學信念系統之分析及其與教學行為關係之研究,國立臺灣師範大學教育心理與輔導研究所,博士論文。[52]曾令燊,2002,應用知識庫技術偵測垃圾郵件於伺服器端的寄收行為,樹德科技大學資訊管理研究所,碩士論文。[53]廖書瑩,2003,利用Repertory Grid擷取出偵測垃圾郵件的分類知識,樹德科技大學資訊管理研究所,碩士論文。